{"id":6202,"date":"2018-07-13T14:10:20","date_gmt":"2018-07-13T14:10:20","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541681"},"modified":"2018-07-13T14:10:20","modified_gmt":"2018-07-13T14:10:20","slug":"zero-day-coverage-update-week-of-july-9-2018","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/","title":{"rendered":"Zero-Day Coverage Update \u2013 Week of July 9, 2018"},"content":{"rendered":"<div class=\"post-text\" readability=\"72.849396536645\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/0-day-graphic-large-300x225.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/0-day-graphic-large-300x225.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/0-day-graphic-large.png 305w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>Earlier this week, I wrote a <a href=\"https:\/\/blog.trendmicro.com\/zero-day-initiative-a-1h2018-recap\/\">blog<\/a> covering a couple of the statistics from the Zero Day Initiative\u2019s (ZDI) first half of 2018. One of the stats that I didn\u2019t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they\u2019re also seeing an increase of submissions in virtualization software vulnerabilities from the likes of VMware and Oracle. With a 33% increase in published advisories compared to 2017, the ZDI has their hands full. With more than 500 new researchers registering to participate in the program this year, the internal ZDI team is growing as well to accommodate this growth. 2018 may just be the biggest year yet for ZDI!<\/p>\n<p>In case you missed it, you can read Brian Gorenc\u2019s <a href=\"https:\/\/www.thezdi.com\/blog\/2018\/7\/9\/checking-in-a-look-back-at-the-first-half-of-2018\">blog<\/a> covering the detailed stats from the ZDI\u2019s first half of 2018.<\/p>\n<p><strong>Microsoft Security Updates<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before July 10, 2018. It was another big month for Microsoft with 53 security patches covering both browsers (Internet Explorer, Edge), ChakraCore, Windows, .NET Framework, ASP.NET, PowerShell, Visual Studio, and Microsoft Office and Office Services. Of these 53 CVEs, 18 are listed as Critical, 33 are rated Important, one is rated as Moderate, and one is rated as Low in severity.<\/p>\n<p>Five CVEs in this month\u2019s Microsoft update came through the Zero Day Initiative:<\/p>\n<p>The following table maps Digital Vaccine filters to Microsoft\u2019s updates. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2018\/7\/10\/the-july-2018-security-update-review\">July 2018 Security Update Review<\/a> from the Zero Day Initiative:<\/p>\n<div class=\"lightTable\">\n<table width=\"0\">\n<tbody readability=\"37\">\n<tr>\n<td width=\"120\"><strong>CVE #<\/strong><\/td>\n<td width=\"162\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"354\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-0949<\/td>\n<td width=\"162\">32494<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8125<\/td>\n<td width=\"162\">32486<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8171<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8172<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8202<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8206<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8222<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8232<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8238<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8242<\/td>\n<td width=\"162\">32487<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8260<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8262<\/td>\n<td width=\"162\">32491<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8274<\/td>\n<td width=\"162\">32492<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8275<\/td>\n<td width=\"162\">32493<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8276<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8278<\/td>\n<td width=\"162\">32358<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8279<\/td>\n<td width=\"162\">32359<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8280<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8281<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8282<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8283<\/td>\n<td width=\"162\">32361<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8284<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8286<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8287<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8288<\/td>\n<td width=\"162\">32488<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8289<\/td>\n<td width=\"162\">32490<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8290<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8291<\/td>\n<td width=\"162\">32360<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8294<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8296<\/td>\n<td width=\"162\">32478<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8297<\/td>\n<td width=\"162\">32551<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8298<\/td>\n<td width=\"162\">32479<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8299<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8300<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8301<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8304<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8305<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8306<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8307<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8308<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8309<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8310<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8311<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8312<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8313<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8314<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8319<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8323<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2018-8324<\/td>\n<td width=\"162\">32558<\/td>\n<td width=\"354\"\/>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8325<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8326<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8327<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td width=\"120\">CVE-2018-8356<\/td>\n<td width=\"162\"\/>\n<td width=\"354\">Vendor Deemed Reproducibility or Exploitation Unlikely<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There is one new zero-day filter covering one vendor in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website. You can also follow the Zero Day Initiative on Twitter <a href=\"https:\/\/twitter.com\/thezdi\">@thezdi<\/a> and on their <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">blog<\/a>.<\/p>\n<p><strong><em>Advantech (1)<\/em><\/strong><\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>32341: RPC: Advantech Webaccess webvrpcs Directory Traversal Vulnerability (ZDI-18-024)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"https:\/\/blog.trendmicro.com\/zero-day-coverage-update-week-of-july-2-2018\/\">weekly recap<\/a>.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/zero-day-coverage-update-week-of-july-9-2018\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this week, I wrote a blog covering a couple of the statistics from the Zero Day Initiative\u2019s (ZDI) first half of 2018. One of the stats that I didn\u2019t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they\u2019re also&#8230;<br \/>\nThe post Zero-Day Coverage Update \u2013 Week of July 9, 2018 appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":6203,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1344,309,306,307,308,2010],"class_list":["post-6202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-advantech","tag-digital-vaccine","tag-network","tag-security","tag-zero-day-initiative","tag-zero-day-coverage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-13T14:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Zero-Day Coverage Update \u2013 Week of July 9, 2018\",\"datePublished\":\"2018-07-13T14:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/zero-day-coverage-update-week-of-july-9-2018.png\",\"keywords\":[\"Advantech\",\"Digital Vaccine\",\"Network\",\"Security\",\"Zero Day Initiative\",\"Zero-Day Coverage\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/\",\"name\":\"Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/zero-day-coverage-update-week-of-july-9-2018.png\",\"datePublished\":\"2018-07-13T14:10:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/zero-day-coverage-update-week-of-july-9-2018.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/zero-day-coverage-update-week-of-july-9-2018.png\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-day-coverage-update-week-of-july-9-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advantech\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/advantech\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero-Day Coverage Update \u2013 Week of July 9, 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/","og_locale":"en_US","og_type":"article","og_title":"Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-13T14:10:20+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Zero-Day Coverage Update \u2013 Week of July 9, 2018","datePublished":"2018-07-13T14:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png","keywords":["Advantech","Digital Vaccine","Network","Security","Zero Day Initiative","Zero-Day Coverage"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/","url":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/","name":"Zero-Day Coverage Update \u2013 Week of July 9, 2018 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png","datePublished":"2018-07-13T14:10:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/zero-day-coverage-update-week-of-july-9-2018.png","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/zero-day-coverage-update-week-of-july-9-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Advantech","item":"https:\/\/www.threatshub.org\/blog\/tag\/advantech\/"},{"@type":"ListItem","position":3,"name":"Zero-Day Coverage Update \u2013 Week of July 9, 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=6202"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6202\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/6203"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=6202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=6202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=6202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}